TRENDING
TARGETED INDUSTRIES -> IT & ITES | Government & LEA | Technology | Healthcare | EducationTARGETED COUNTRIES -> United States | Russian Federation | China | United Kingdom | GermanyTARGETED REGIONS -> North America (NA) | Europe & UK | Asia & Pacific (APAC) | Middle East & Africa (MEA) | South America (SA)IOCs -> a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 | 7bdbd180c081fa63ca94f9c22c457376 | 2.2.2.2 | 155.133.5.15 | 118.69.65.60CVEs -> CVE-2024-21887 | CVE-2023-46805 | CVE-2024-21893 | CVE-2021-44228 | CVE-2024-1709TECHNIQUES -> T1082 | T1140 | T1083 | T1486 | T1105TACTICS -> TA0011 | TA0007 | TA0010 | TA0005 | TA577TAGS -> security | the-cyber-express | firewall-daily | the-cyber-express-news | malwareTHREAT ACTORS -> Lockbit | Blackcat | VoltTyphoon | Lazarus | MidnightBlizzardMALWARE -> CobaltStrike | Darkgate | Mirai | Xmrig | QakbotSOURCES -> Darkreading | The Hacker News | Bleepingcomputer | The Cyber Express | Infosecurity Magazine
CRIL Updates
Critical D-Link NAS vulnerability under active exploitation FatalRAT’s New Prey: Cryptocurrency Users in the CrosshairsElevating the Stakes: The Enhanced Arsenal of the Fake E-Shop CampaignSolana Drainer’s Source Code Saga: Tracing Its Lineage to the Developers of MS DrainerWarzoneRAT Returns with Multi-Stage Attack Post FBI SeizureCGSI Probes: ShadowSyndicate Group’s Possible Exploitation of Aiohttp Vulnerability (CVE-2024-23334) Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA ExtensionsThe Spreading Wave of Pig-Butchering Scams in IndiaJetBrains TeamCity Authentication Bypass vulnerability under Active ExploitationSapphireStealer Sneaks In: Deceptive Legal Documents Prey on Russians
Next-Generation
AI-Powered Cybersecurity Platforms
Tailored for Enterprises, Government, & Law Enforcement
Empower Your Defense Against Cyber Threats with Cyble Vision and Cyble Hawk: Experience Award-Winning
AI-Powered Cybersecurity
Latest Research Report
Threat Landscape Report 2023- 2024
Explore the depths of the cyber threat landscape with our comprehensive 2023-2024 report. Uncover the trends, tactics, and predictions that will shape the future of cyber security.
Beyond Threat Intelligence
Unlock Possibilities Beyond Threat Intelligence:
Comprehensive Solutions and Services Under One Umbrella, Empowering Your Security Ecosystem
Cyber Threat
Intelligence
Unlock Comprehensive Threat Intelligence with Cyble: Prioritize and Mitigate Risks Effectively
Dark Web & Deep Web Monitoring
Discover Dark Web Threats with Cyble's Advanced Technology
Attack Surface Management
Proactive Threat Detection for Web, Mobile, Cloud, IoT, and more
Vulnerability Management
Stay Ahead of Security Risks with Cyble's Zero-Day Vulnerability
Monitoring
Brand
Intelligence
Protect Your Brand with Cyble's Rapid Takedown Solutions
Takedown &
Disruption
Combat Online Fraud and Cybercrime with Cyble's Powerful Takedown Services
Customers Rated Cyble Vision Platform: 4.6/5 Stars
Read what the top companies across the world have to say about our platform.
Latest blogs by Cyble Research and Intelligence Labs (CRIL)
Cryptocurrency
FatalRAT’s New Prey: Cryptocurrency Users in the Crosshairs
April 11, 2024
Read More →
Cybercrime
Elevating the Stakes: The Enhanced Arsenal of the Fake E-Shop Campaign
April 3, 2024
Read More →
See Cyble in Action
Request a personalized demo and discover how our advanced threat intelligence can empower your organization’s cybersecurity strategy. Witness the integration of our solutions with your existing security tools and understand how we can help you navigate the complex landscape of cyber threats.